|Publication number||US7164666 B2|
|Application number||US 10/051,746|
|Publication date||Jan 16, 2007|
|Filing date||Jan 18, 2002|
|Priority date||Jan 18, 2001|
|Also published as||CA2331558A1, US20020110098, US20070238444|
|Publication number||051746, 10051746, US 7164666 B2, US 7164666B2, US-B2-7164666, US7164666 B2, US7164666B2|
|Inventors||Frank E. Bunn, David Hughes, Steven Katz|
|Original Assignee||Northwater Intellectual Property Fund L.P. (Bunn)|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (11), Referenced by (3), Classifications (16), Legal Events (5)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present application claims priority from Canadian Patent Application No. 2,331,558. The present invention relates generally to wireless communication, and specifically to a system and method for multiplexing wireless devices having a single telephone number.
Cellular telephony has been designed to permit a wireless device to send date and or voice messages over a wireless communications network providing the device is able to transmit its device identification codes appropriate to the network on which it is attempting to transmit. Wireless communications is a global and rapidly expanding technology. The advent of wireless cellular telephony for digital information applications such as pagers, e-mail and internet, point of sale terminals, and the like, to say nothing of the wireless telephone voice systems applications is compounding this resource depletion problem. Several alternative systems and networks are common, including analogue and digital voice systems, data only systems, cellemerty, short data burst packetizaton, microburst technologies and the like.
Current technology uses identifier codes for each wireless device in the form of an Electronic Serial Number (ESN) and a Mobile Identification Number (MIN) It is standard practice to assign one and only one wireless network system calling number, such as a cellular telephone number (TN), to one and only one mobile device having a unique ESN/MIN combination of identification codes. Several patents, such as U.S. Pat. No. 5,765,107 issued to Korowajesuk, U.S. Pat. No. 5,905,949 issued to Hawkes et al, U.S. Pat. No. 5,870,672 issued to Stoddard et al, and U.S. Pat. No. 6,097,939 issued to Jacobs, have attempted to develop systems to detect the use of more than one mobile device using the same ESN/MIN such that fraudulent use can be traced. This misuse involves having more that one device with the same MIN/ESN pair ID such that the original device assigned the ID gets charged the costs for any use of the network regardless of which actual device uses it. Fraud can be involved if any of the non-original devices are used without authorization by the owner of the original device.
Every time a wireless network communications device is powered, that is the transceiver is powered on, the device transmits its unique code, such as the ESN/MIN pair, to the wireless network communications system with which the device is designed to function. As long as the device is powered the device also send the code at fixed or random, but repeated, intervals to the wireless system with which it is designed to function. Additionally, every time the device attempts to send a message or communication to the network system, the device also transmits its unique ESN and/or MIN codes to Fat system during the initialization of that communication. The system checks the codes to verify that the device is allowed to use the system, and, if verified, allows the device to conduct the communications utilizing the system.
It is the global expansion that is using up the precious resources of radio frequency bandwidth and phone number assignment. However, if multiple devices use the same ESN/MIN pair for the same phone number, it may appear as if someone is attempting to fraudulently utilize the device, Thus there is a need for a system and method that allows multiple devices to share common identifiers without falsely creating a fraud alert.
In accordance with an aspect of the present invention there is provided a method for multiplexing a plurality of wireless devices with a wireless network, each of the wireless devices sharing a common telephone number. The method assigns a predefined access time for each of said wireless devices. The method also assigns a predefined length of time during which each of said wireless devices will have access to said wireless network. A sequence of accesses to the wireless network can then be initiated in accordance with the predefined access time and the predefined length of time such that a maximum of one of the wireless devices accesses said local network at a time.
Embodiments of the invention will now be described by way of example only with reference to the following drawing in which:
For convenience, like numerals in the description refer to like structures in the drawings. Referring to
The central controller or computer 6, serves a specific geographic area. This geographic area may range from a single town to entire countries or continents. The central controllers are connected with each other via a network such as a telephony network or the Internet. The central controllers serving specific geographic areas may be located, for example, at electric meter a reading/billing agencies connected to remote meters (Unit three), vending machine operations headquarters (not shown) or rental vehicle agencies (Unit four), and individual persons (Units one and two). The central controllers may also be accessed by independent distributed terminals linked by suitable communications networks.
Each of the wireless units includes a local controller, circuitry, software, fuzzy logic and hardware capable of permitting the device to function as a wireless communications device. The fuzzy logic hardware and software is further capable of receiving, processing, storing, and controlling the device's power ON and OFF sequencing, accurately keeping time and receiving and updating the programming sequencing and time correction.
If, however, multiple devices have the same MIN, ESN and TN and only one device is powered ON at a time, then the wireless network will have great difficulty recognizing which device is the original. It should be noted that as soon as a typical unit is power ON, the standard cellular unit immediately tries to contact the network to give the network the unit's ID so the network can process any communications for that unit. If, however, two units are ON simultaneously, the network will detect a conflict or communications collision and immediately recognize a potential fraudulent use of the network. This occurs when the second unit tries to access the network while the first unit is communicating with the network, the network knows the MIN/ESN pair ID is already activated and thus the network may assume the second unit is a fraud or clone of the first.
In an alternate embodiment, the timing initially stored in the device as described above can be altered, either temporarily or permanently, from a remote location. In order to explain how this can be achieved, the functionality of wireless communication is described. Referring to
At some time later, the device can call a telephone number world wide using the standard telephony protocols 52 during which the control channels transceiver passes the device's ID and the dialed telephone number TN to the network 53. The network control channels setup the connection 54 to the called phone and completes the connection 55. The wireless device control channels recognize the connection engaging the call on the voice or data channels 56 and the device control channels revert back to the idle ON condition 57. The network voice channels functionally connect the voice or data call 59 and the network control channels relative to the device also revert to the idle ON condition 58. Upon the phone device ending of the call 60, the network terminates be voice channel connection 61, and the device control channel functions return to the condition of sending the device ID to the network 62. The network control channels receive the ID 63, verity the ID 64 and accept the device as ready to use the network for voice or data communications 65. The device control channels acknowledge ready to dial 66, the network voice channels recognize the device is allowed to dial 67, and the device is actively ready to dial 68. If the device is powered off, the phone activity powers OFF the transceivers, the phone voice and control channels deactivate, and the network control and voice channels cease to acknowledge the presence of the device until its activity is powered ON and the process begins again.
In the present embodiment, necessary circuitry and subsystems are included in the local controller to receive a sequencing program and/or accurate time update corrections. These adjustments can be made through a wireless network communication, a hardwired link, or a radio transmission during any sequence wherein the device is turned ON. Furthermore, the central controller includes the necessary software, hardware, and fuzzy logic to download the program and time updates. For the cellular network system described above, these communications are done using the voice or data channels of the device and most often would transmit the communication using the voice transceiver. This communication follows the typical process described with reference to
When the local controller and the wireless device successfully access the wireless network, the local controller activates the wireless device to be ready to receive a voice or data phone call 204, and unit waits for a call. If a call does not come during the computed duration time T1 of access to the wireless network, then the local controller again 203, powers OFF the wireless device until the next system computed time to activate the system at 201. If a call comes during the active access to the wireless network, the system using fuzzy logic decides 205, if the call is a voice call and processes the call while checking 206, every T3 time duration, to detect if the network access time period has elapsed. If the call is ended and the network access time has not elapsed the fuzzy logic returns to waiting for a call 204, but if the time has elapsed 207, the local controller powers OFF the wireless device and resets to wait until the next system computed time to activate the system again 201.
When then next call arrives the fuzzy logic decides if it is a control channels call and it processes the call by 304, as above but if it decides the call is a voice or data call it processes 303, the call as a voice or data call and assesses 308, if the call has a command action needing response. If no command is received after processing the voice or data call, the local controller returns the system 302, to waiting for a call but if the call has a command and that command is to turn OFF the voice channels, the local controller powers OFF 309, the voice transceiver and activates the operation using the unique MIN (1) and the shared ESN as ID for communications on the wireless control channels and returns the system 302 to waiting for a call but this time the call can only be a control channel call. If the command is of another type, the local controller processes 310, the command with appropriate action, checks for other voice or data calls and returns the system 302, to waiting for a call.
The system and method described above enables multiplexing the use of a given pair of identifying codes in order to conserve wireless communications resources. The current practice of assigning one phone number to each new device identification code accessing the network imposes significant costs onto the communications network provider. These costs include establishing new phone numbers, expanding the network data base system for each new number, expanding he telephony switching systems to handle the new numbers, expanding the automated billing systems to handle the new numbers, maintaining ever larger network systems to support more numbers. These costs to the network providers could be slashed by orders of magnitude through the application of the methods described herein. For example, assigning one phone number to 10 devices each with identical identification codes approved for accessing the network could reduce these costs by a factor of 10 to 1. Furthermore, the network system providers could gain a 10 to 1 increased income from more use of the network. All this improvement in efficient use of the network at reduced cost and increased income is in addition to gains from conserving the frequency bandwidth and device's calling phone number resources.
Even more significant gains could come from opening up new markets for the network providers implementing these methods and apparatus. There are numerous low volume data reporting applications such as remote metering devices, for example, which need to report small quantities of data on a regular, but infrequent basis. Wireless data fission is an ideal solution but the fixed costs to network providers, and indirectly to end users, of maintaining a unique MIN/ESN pair for each device make use of existing wireless networks too expensive to be commercially viable. Multiplexing of wireless devices could reduce costs substantially with the result that such applications using “limited time” access to the network could bring new revenue streams to the network providers without using up precious phone number and bandwidth resources.
Additionally, gains could be realized as the invention can be applied across multiple platforms, including but not limited to, analogue and digital cellular phones, one-way pagers and two-way pagers.
Further, a significant saving is the cost saving in fees to access the system. The way most existing network systems operate is to charge an access fee, often fixed monthly, annually, or such like, for each device, with its unique identification codes such as MIN/ESN, approved to access the network. The methods described herein allow as many devices Fat have been established with the same codes to access the network for one fee. For methods where user share the same ESN and TN, but have a unique MIN, the extra cost is in the order of cents, and is thus usually insignificant. Additionally, network providers offer blocks of network access time packaged into the fixed fee-period. Applications that require small amounts of access time per month are wasting access that is already paid for. The methods described above can multiplex these applications so that the packaged access time could be utilized fully in each fee-period making up to 100% efficient use of the service paid for by the user and provided by the network.
The number of devices that could be multiplexed is nearly limitless, and depends mainly upon the length of powers-time and the scheduling of the power-on-time. As another example, if 1,440 devices are utilized and all given one minute of access, then in one day (1440 minutes) they all could access, or be accessed by, the network system. An application example of this use could be the automatic reporting of electricity meter readings, where metering facilities at the electricity user's location could be appropriately equipped and programmed to call in to a billing office once per month to report the current electricity usage from the metering facility.
The main restriction is that it is preferable that no two wireless devices be powered on at the same time. This limit is a result of the fact that wireless communications network providers route messages to a specific identification set of codes such as a MIN/ESN combination. As a result, the network providers would be unable to route messages appropriately if two or more devices with the same MI/ESNN combination were to access the network simultaneously. This restriction is not a limitation of the method disclosed.
The length of time any one device is powered on need not be a function of any other device's on-time. The scheduling must be coordinated for all devices having the same codes, and this facility is preferably built into the devices themselves. The scheduling can be set or reset remotely via the communications network or a central calling facility sending the scheduling to the device configured to receive and store the schedule. The scheduling also could be loaded and stored into the device by physically connecting it to a scheduling system or the device could have the scheduling stored permanently in the device. In the event of a power failure to the device, when power is restored the device is configured so that the transmitter component remains off. The power turns on when the device checks the scheduling or power on cycling sequence stored in the device's non-volatile memory to doe when that device is scheduled to apply power to its transceiver.
Whether the wireless device initiates the call to the communications network or a host central system calls the device, the function and the scheduling requirement are the same. In the case where the wireless device is placing a call to the communications network, the device has the facility to maintain accurate time and have calling scheduling stored within the device. In the case where the centralized facility calls the device, the scheduling could be maintained in the central facility and the wireless device need only store the time of day and duration of power-on time. In both cases, the device is envisioned to facilitate wireless updating of the time of day, the power-on duration and time of power-on.
In the case where the device automatically calls to a centralized facility to automatically report, the device is configured to have stored in its memory the scheduling of what information is to be reported, as well as the cycling sequence of current time of day, power on duration, and the time of power on for the device's transceiver. In the case where a person is using the device to initiate a voice or data call, the device still retains the cycling sequence of current time of day, power on duration, and the tune of power on for the device's transceiver. The device can be configured to display to the user, current time and/or time remaining until the next transceiver power-on cycle and duration sequence for that device.
The applications for this multiplexing of devices is very broad and not limited to the geographic location of the device, nor the wireless communications system receiving facility, location nor the wireless communications system itself. The applications include regular voice communications and data communications, and are not limited to the type of networks or the protocols on which they operate. These protocols include analogue AMPS, digital CDMA, GSM, TDMA, CDPD. Further, the application is not limited by the devices themselves, including cellular phones, pagers, personal assistants, or their operating systems.
The 10 device example could represent ten cellular telephones used by ten people of a group, and each phone is programmed to access the network only at preset times. The phone could be programmed such that it alerts the user when its network system access time is active. In this example, each of the users in the group could make a voice call limited in time to once per hour and limited in duration to 6 minutes.
The 1440 device example could represent 1440 electric meters which initiate the call, rapidly report data to a central facility, and terminate the call within one minute, and all 1440 within one day. If meter readings are only needed once per month, and if the calls are each one minute or less, then for a 30 day month 31,320 devices could report meter readings.
In an application where the device is located in a mobile unit, say a vehicle, and if the location of the vehicle is important, the device could contain the apparatus and facility to access the global positioning system of satellites (GPS). In this case, the accurate updating of time and date as well as position could be acquired from the GPS communications. The device could then also report the GPS information as well as the information for which the device was designed and implemented. Another example where the device could automatically update its stored time of day is where the device is configured to connect with a source of time calibrations such as the standard broadcast time signals from WWV, in the U.S.A., or CHU, in Canada and the like.
In any of these applications, the limited duration of a call by any one device, and hence the limit of information communicated during a call, could be augmented by the device having the facility to segment the information to be transmitted. The device could begin transmitting information and as the transmission progressed, the device could recognize that the call termination time limit was near. The device so could close the current information transmission and terminate the call within the time limit, such that the device could continue the transmission in the next allowed transmitter power-on cycle, continuing from the point at which it left off in the previous call. This way, there is virtually no limit on the amount of information transmitted from any given device. The facility being called would need to have the appropriate facility to receive segmented information and be able to reassemble these segments for a complete message. Error correction methods familiar to the technology could be incorporated in both the devices and the central facility to assure any messages or segments received or interrupted could be retransmitted so that messages could be successfully assembled.
The terms and expressions which have been employed in this specification are used as terms of description and not of limitations, there is no intention in the use of such terms and expressions to exclude any equivalence of the features shown and described or portions thereof. While the invention has been described in connection with the specific embodiments thereof, and in a specific use, various modifications will be apparent to those skilled in tile art, without departing from the spirit of the invention as set forth in the claims appended hereto.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US5765107||Mar 21, 1996||Jun 9, 1998||Leonhard Korowajczuk||Detection and identification of a fraudulent wireless telephone user|
|US5870672||Apr 5, 1996||Feb 9, 1999||Corsair Communications, Inc.||Validation method and apparatus for preventing unauthorized use of cellular phones|
|US5905949||Dec 21, 1995||May 18, 1999||Corsair Communications, Inc.||Cellular telephone fraud prevention system using RF signature analysis|
|US6044267 *||Mar 24, 1997||Mar 28, 2000||At&T Corporation||Method for network operability of a multi-function cordless/cellular telephone|
|US6097939||Jul 11, 1997||Aug 1, 2000||Compaq Computer Corporation||Method and apparatus for event data maintenance per MIN/ESN pair in a mobile telephone system|
|US6226280 *||Dec 11, 1997||May 1, 2001||Texas Instruments Incorporated||Allocating and de-allocating transmission resources in a local multipoint distribution services system|
|US6449483 *||Nov 18, 1999||Sep 10, 2002||Lucent Technologies, Inc.||Wireless telephone system for accessing multiple stations via a single telephone number|
|US6477368 *||Apr 28, 2000||Nov 5, 2002||Motorola, Inc.||Method for dynamic transmitter training for a shared communication system utilizing dynamic channel allocation|
|US6563806 *||Dec 11, 1998||May 13, 2003||Hitachi, Ltd.||Base station for multi-carrier TDMA mobile communication system and method for assigning communication channels|
|US6608827 *||Feb 1, 1999||Aug 19, 2003||Bellsouth Intellectual Property Corporation||Method for increasing the communication capacity of a cellular telephone system|
|US6741579 *||Dec 29, 1998||May 25, 2004||Lg Information & Communications, Ltd.||Data communication method between base station and mobile terminal in mobile radio communication system|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8344851 *||May 31, 2007||Jan 1, 2013||Samsung Electronics Co., Ltd.||Method for providing remote mobile device access and control|
|US8712432||Jul 1, 2011||Apr 29, 2014||Absolute Software Corporation||Method and system for tracking mobile electronic devices while conserving cellular network resources|
|US20070293194 *||May 31, 2007||Dec 20, 2007||Samsung Electronics Co., Ltd.||Method for providing remote mobile device access and control|
|U.S. Classification||370/329, 370/465, 370/337|
|International Classification||H04W8/26, H04Q11/04, H04J3/16, H04L12/56, H04L12/28, H04W72/12, H04W52/02, H04W74/04, H04W74/00|
|Cooperative Classification||H04W52/0219, H04W52/0216, H04W60/02|
|Nov 13, 2006||AS||Assignment|
Owner name: BDO DUNWOODY LIMITED, CANADA
Free format text: COURT APPOINTMENT OF TRUSTEE;ASSIGNOR:NAVLYNX TECHNOLOGIES INC.;REEL/FRAME:018511/0672
Effective date: 20050518
Owner name: NAVLYNX TECHNOLOGIES INC., CANADA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BUNN, FRANK E;HUGHES, DAVID;KATZ, STEVEN;REEL/FRAME:018511/0657
Effective date: 20030328
Owner name: NORTHWATER INTELLECTUAL PROPERTY FUND, L.P.1, CANA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BDO DUNWOODY LIMITED;REEL/FRAME:018511/0712
Effective date: 20061011
Owner name: NORTHWATER PATENT FUND L.P. (BUNN), CANADA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NORTHWATER INTELLECTUAL PROPERTY FUND, L.P. 1;REEL/FRAME:018512/0197
Effective date: 20061113
|Jun 28, 2010||FPAY||Fee payment|
Year of fee payment: 4
|Aug 29, 2014||REMI||Maintenance fee reminder mailed|
|Jan 16, 2015||LAPS||Lapse for failure to pay maintenance fees|
|Mar 10, 2015||FP||Expired due to failure to pay maintenance fee|
Effective date: 20150116